Firstly, they only claim copyright infringement on their software and GUI - not the hardware or associated patents. And yes, the iOS license forbids pretty much everything except downloading and running it on a single Apple-issued device you own, but jfc.
-
-
Show this thread
-
It all sounds like if Corellium told users to bring their own IPSWs and didn't use Apple trademarked names, Apple's case would fall apart. Also they make it sound like Corellium created a knockoff of iOS, when they seem to literally be downloading the original software.
Show this thread -
Apple also seems to at least partially try and make a case against fair use, complaining about how Corellium doesn't force its customers to report vulnerabilities to Apple. If it wasn't about fair use here, I imagine these two paragraphs would just be met with "yeah, so what?".pic.twitter.com/NwNpOBBGbZ
Show this thread -
This part though sounds wildly misleading. First, unc0ver is a jailbreak, not an exploit. None of the unc0ver developers developed any of the exploits used in the app.pic.twitter.com/8fojoD6440
Show this thread -
And second, this seems to imply that Corellium aided in exploit development in this specific case - except the exploit used was voucher_swap by
@_bazad, published in full more than two and a half months before being used in the unc0ver jailbreak.Show this thread -
And then there's this, which I would call primordial bullshit. - They always have and still do oppose any kind of security research. Maybe not to the point of suing people, but it's very clear their actual concern is PR, not security.pic.twitter.com/xi8meXQ394
Show this thread -
- The mentioned positions are merely a week old. Before that, the maximum payout was only a fifth of the quoted sum, the majority of vulnerabilities wouldn't qualify, and you first had to get invited anyway, into a bounty program so secretive even its NDA is under NDA.
Show this thread -
- These (NB newly announced) "custom versions" of the iPhone aren't even gonna be available until 2020, and the phrase "legitimate security researchers" strongly implies it will not be available to the general public, but only those favored by Apple.
Show this thread -
- The security-wise most important parts of iOS (boot chain & SEP) are encrypted in such a way that only those who have hacked these parts already can decrypt and analyze their firmware, and Apple provides no way of what they call "legitimately" gaining access to those.
Show this thread -
Before iOS 10, this was even the case for ALL parts of iOS. And they continue to do this despite the fact that people who hacked these components have been publishing keys for them for as long as they have existed. aPple STrongly SuPPOrTS gooD-fAiTh SeCUrITY rESeArCh. Yea rite.
Show this thread
End of conversation
New conversation -
-
-
I... will never be able to unsee this.
End of conversation
New conversation -
-
i think they purposefully dumbed their case down as to maximise likelihood of non-technical jurors buying it, as
@iBSparkes said -
Unc0ver exploit.. so professional
shame Apple always act like this. They will continue doing it as usual.. hope they don't win the case tbh
End of conversation
New conversation -
-
-
This is fucked up.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
that's an awfully long thread for a NAL ;-P besides, perhaps all they need is an injunction to escrow/see the code (fastsim ftw)
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
It’s almost like
@apple saw this tweet by@Pwn20wndhttps://twitter.com/pwn20wnd/status/1159563854386360320?s=21 …Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
You anal? Well, ok
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Damn imagine how proud
@pwn20wnd probably is right nowThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
This Tweet is unavailable
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.